File systems security: Shared folders & NTFS permissions, EFS Disk Quotas

Size: px
Start display at page:

Download "File systems security: Shared folders & NTFS permissions, EFS Disk Quotas"

Transcription

1 File systems security: Shared folders & NTFS permissions, EFS Disk Quotas (November 2, 2015) Abdou Illia, Fall Learning Objective Understand Shared Folders Assign Shared Folder permissions NTFS Permissions Understand EFS Understand Disk Quotas 2 FAT vs. NTFS Decision about what file system to use depends on: Whether multiple OS will be installed on the computer Security requirements for the system FAT Supports partitions up to 4 GB (FAT16) and 2 TB (FAT32) Provides only folder-level security Allows limited permission setting (Read, Change, Full Control) NTFS Supports lager partitions size than FAT (w/o disk performance decrease) File-level and Folder-level security Data compression File encryption (Encrypting File System) Disk quotas management Needed for AD services Faster access to data Remote storage: provides an extension to your disk space by making removable media (such as tapes) more accessible. Note: Windows and MS-DOS-based applications can read compressed files because they are automatically decompressed by NTFS when requested. 3 1

2 Shared Folder? A folder used to provide network users with access to file resources. When a folder is shared on a server, users can connect to the server and gain access to the files it contains. 4 Shared Folders Requirements for creating a shared folder: Any supported File system (FAT, NTFS) If server in a domain, you must be Administrator or Server Operator If server in a workgroup, you must be Administrator or Power user If client computer running a workstation OS, you must be Administrator or Power user Note: Users that are granted the Create Permanent Shared Objects right can also create shared folders on the computer where the right is assigned To see all shared folders on a computer: 1) Click Start. Then click Run 2) Type \\ComputerName (where ComputerName is a valid network computer name like SRVDC18) 3) Click OK. OR 1) Open Computer Management 2) In the console tree, double-click Shared Folders 3) Click Shares To share a folder on a computer: 1) Open My Computer (Right-click/Open) 2) Select a disk, then the folder to share 3) Right-click the selected folder 4) Click Properties 5) Click the Sharing tab 6) Check Share this folder 7) Click Apply, and then OK. 5 Shared folder permissions A shared folder can contain application programs, data or other users personnel data Each type of data can require different permissions Shared Folder Subfolder 1 Subfolder 2 Subfolder 3 Subfolder 4 File 1 File 2 File 3 With FAT, permissions could only be set for folders, not for individual files If permissions at file level are required, you need to use NTFS permissions 6 2

3 Shared Folder Permissions Read - Display folder names, filenames, file data and attributes - Run program files Change Read permission + - Create folders, add files to folders, change data in files, append data to files, change files attributes, delete folders and files. Full Control Change permission + - Change file permissions and take ownership of files Shared folder permissions do not restrict access to users who gain access to the folder at the computer where the folder is stored. Shared folder permissions are the only way to secure network resources on FAT partitions. The default folder permission is Read for Everyone. You can allow or deny shared folder permissions to individual users or to user groups. 7 Assigning Shared Folders permissions 1) Open My Computer (Right-click/Open) 2) Select the disk, then the folder 3) Right-click the selected folder 4) Click Properties 5) Click the Sharing tab 6) Click Permissions 7) Assign permissions 8) Click OK, and then OK. 8 Shared Folder Permissions Rules Multiple Permissions (The Combination Rule) If a user is assigned a permission for a Shared folder and If the use user belongs to a group to which a different permission is assigned, Then the user s effective permissions are the combination of the user and group permissions Deny overrides Allow If you deny a shared folder permission to a user and If you allow the same permission to a group the user belongs to Then the user will not have that permission. Copying or Moving Shared folders If you copy a Shared folder, the original folder is shared but not the copy If you move a Shared folder, it is no longer shared. 9 3

4 Guidelines for Shared Folder Permissions Determine which groups need access to each resource and the level of access they require. Assign permissions to groups instead of user accounts to simplify access administration. Assign the most restrictive permissions that still allow users to perform required tasks. Use intuitive share names so that users can easily recognize and locate resources. 10 Administrative & Hidden shares Administrative shares (created by default): All hard drives are shared as C$, D$, etc. The system folder (\WINDOWS) is shared as Admin$ Driver s folder for printers (\Winnt\System32\Spool\Drivers) is shared as Print$ Hidden shares (created by users) Share name should end with $ for the share to be hidden Not visible by other users unless they know the name If a user knows the name of a hidden share, he/she can access the share using the UNC name Start/Run. Then type \\ComputerName\ShareName$ Universal Naming Convention (UNC) name 11 NTFS permissions If permissions at file level are required, and/or If more specific permissions are required Then, NTFS permissions must be used Assigning NTFS permissions 1) Open My Computer (Right-click/Open) 2) Select the disk, then the folder/file to share 3) Right-click the selected folder or file 4) Click Properties 5) Click the Security tab 6) Assign permissions 7) Click Apply, and then OK. 12 4

5 Standard NTFS permissions Read User can open and view content of files/folders. They can also view objects ownership, assigned permissions, and objects attributes (Read-Only, Hidden, etc.) Write Read permission + - Create new files/subfolders in a folder - Change attributes List Folder Contents Can only view names of folders/files Read and Execute Read and List Folder Content permissions + - Ability for users to navigate through folders for which they don t have permission in order to get files and subfolders for which they do have permissions. Modify Read + Write + Read and Execute permissions (Users can view, create, delete, modify content of folders, etc.) Full Control Users can do everything 13 Extended NTFS permissions Execute File List Folder / Read File Read Attributes Read Extended Attributes Create Files / Write Data Write Attributes Write Extended Attributes Delete Subfolders and Files Read Permissions Change Permissions Take Ownership 14 NTFS permissions With NTFS permissions, you have an ACL for each resource (Folder, file, etc.) you can assign permissions for. Access Control List User1 User 2.. Execute File, etc. Read File, etc. Folder SubFolder1 File1.txt File2.txt SubFolder2 File1.doc File2.exe SubFolder3 15 5

6 Golden rule Exception to Golden rule NTFS Permissions Rules Multiple Permissions NTFS file permissions take priority over NTFS folder permissions A user can always access files for which he/she has permissions using UNC. E.g. \\SRVDC16\Data\file1.txt Denying a permission for a user blocks that permission, even if the permission is granted to a group the user belongs to. Permission Inheritance By default, permissions assigned for the parent folder are inherited at subfolder and file level To prevent automatic inheritance, explicit permissions assignments must be done at subfolder and/or file levels. Copying or Moving Files and Folders When a file/folder is copied or moved to another NTFS partition on a different physical disk, it inherits the permissions & attributes from the destination folder When a file/folder is moved within an NTFS partition, it retains its permissions When a file/folder is moved to another NTFS partition on the same physical disk it retains its permissions 16 When a file/folder is copied to a FAT partition, it loses its NTFS permissions Shares & permissions: Recap Sharing folders/files Setting permissions FAT NTFS FAT NTFS Folders/Subfolders YES YES YES (but limited) YES Files NO NO NO YES 17 Encrypting File System EFS is used to encrypt data in order to prevent intruders to read. The Golden rule do not apply to encrypted files/folders EFS is used to encrypt data stored on storage media or data in transit 18 6

7 Why use EFS? With NTFS permission, if someone is given the Take Ownership permission on your file/folder, they can log on, take the ownership of the file/folder, and then change permissions the way they want to. With EFS, in addition to access rights, a deencryption key is needed to read a file*. If someone got a copy of your file, or took ownership of it, they cannot read its content. Note 1: * When you logon, a private de-encryption key is automatically issued to you by W Note 2: Only the file/folder s creator or the Recovery Agent (the Administrator) can decrypt the file/folder How to encrypt a folder 1. Right-click the folder you want to encrypt 2. Click Properties 3. In General tab, click the Advanced button Note 1: The command line cipher could also be used to encrypt Note 2: Golden rule doesn t apply to encrypted files/folders 20 Exercise Create a user account for yourself with the username last (where last is your last name) Log off as Administrator, and logon using the last user account you have created Create a folder called Lab3-XX (where XX is your computer number) directly under the root of the C: drive. Encrypt the Lab3-XX folder Answer the following questions If you copy the encrypted folder to another NTFS partition, it will loose it encryption properties. T F Another user logon to your network. That user can read your encrypted file only if he/she took ownership of your encrypted file, and changed the permissions. T F 21 7

8 Disk Quotas Disk Quotas needed because Many users save data on shared folders Users must be prevented from filling disk capacity Disk Quotas options Enable Disk quotas w/o limiting disk usage Set a default quota for all users (per-volume basis) Set quotas on per-user basis Note: Disk Quotas only available on NTFS partitions 22 Enable/Configure Disk Quotas 1) Open My Computer 2) Right-click the volume, and click Properties 3) Click Quota tab 4) Enable quotas management 5) Configure Disk quotas 23 Disk Quota Parameters Enable quota management: Sets up quota management and starts tracking disk usage Deny disk space to users exceeding quota limits: Users can t write new information after reaching their quotas Do not limit disk usage: Tracks disk usage without imposing quotas Limit disk space to: Sets the default amount of disk space for all users 24 8

9 Disk Quota Parameters (continued) Set warning level to: Sets the default disk space that users can occupy that will trigger a warning message Log event when a user exceeds their quota limit: An event is entered in the System log when a user reaches his or her quota Log event when the user exceeds the warning level: An event is entered in the System log when a user receives a warning that he or she is approaching the quota 25 Delete a Quota entry 1) Open My Computer 2) Right-click the volume, and click Properties 3) Click Quota tab 4) Click the Quota Entries button 5) Right-click the appropriate user account 6) Click Delete 26 Other slides: - Configuring Auditing - Taking ownership 27 9

10 Configuring Auditing Auditing allows to keep track of events like Write, Create, Delete, Append, etc. on folders/files Need to implement auditing on folders and files that involve sensitive information (accounting, payroll, research projects, etc.) 28 Configuring Auditing 1) Right-click the folder/file you want to audit 2) Click Properties 3) Click Security tab 4) Click Advanced button 5) Click Auditing tab in the Access Control Settings dialog box, and click Add 6) Double-click the group or user you want to audit 7) Check the Successful or Failed events to audit 8) Click OK as many times as needed. 29 Taking ownership Note: If you are the owner of a folder/file (or have the Take ownership permission), you can change other users permissions 1) Right-click the folder/file you want to take ownership 2) Click Properties 3) Click Security tab 4) Click Advanced button 5) Click Owner tab in the Access Control Settings dialog box, and click Add 6) Change the ownership 7) Click OK as many times as needed

11 Disk Quotas: Summary Questions 1) The Computer Planning Committee at your company is working to project Windows Server 2003 disk capacity needs for the next two years, as part of the computer equipment budgeting process. Because you are part of the committee, they asked you if there is any way to gather statistics on present disk use over a three-month period to help in making projections. How can you obtain the statistics that they want? a) Turn on disk auditing for each user s account, and compile the audit report b) Set the default disk quota to a low number, and gather statistics based on the resulting reports that users are out of disk space c) Enable disk quotas, and after three months copy the disk quotas statistics into a file (e.g. spreadsheet or word processor file) d) There is no easy way to gather statistics except to ask all employees to calculate the space they use. 31 Disk Quotas: Summary Questions 2) The management in your organization wants to limit all employees to 7 MB of disk space, on each volume, which they can use to store files in shared folders and in home folders. What is the best way you can accomplish this? a) Set up a default disk quota of 7 MB on each shared volume. b) Set up a disk quota for each user via the Active Directory. c) Set up a default disk quota of 7 MB for each user account on each volume. 3) Sara and Richard each have a disk quota of 2 MB. Recently Sara has taken ownership of an 800 KB database file previously owned by Richard. How does this action affect their disk quotas? a) When ownership of a file is transferred, that file is exempt from the disk quota allotment. b) The disk quotas of Sara and Richard are unchanged. c) Sara s disk quota is now 2.8 MB, but Richard/ s stays the same. d) Sara has 800 KB less space out of the 2 MB quota, and Richard has 800 KB more. 32 Disk Quotas: Summary Questions 4) The lead research scientist in your company needs to work over the weekend to prepare information for a lecture he is presenting on Monday. He does not know how close he is to reaching his disk quota and is calling you to find out. How can you determine where he stands? a) There is no way to determine where he stands, but you can increase her quota to make sure there is no problem. b) Check the Quota Entries dialog box in the properties of the shared disk volume that he uses. c) Open the Command prompt window and use the Quota command along with his account name to find out

SHARING FILE SYSTEM RESOURCES

SHARING FILE SYSTEM RESOURCES 1 Chapter 9 SHARING FILE SYSTEM RESOURCES Chapter 9: SHARING FILE SYSTEM RESOURCES 2 CHAPTER OVERVIEW Create and manage file system shares and work with share permissions Use NTFS file system permissions

More information

9 Administering Shared Folders

9 Administering Shared Folders 9 Administering Shared Folders Exam Objectives in this Chapter: Manage and troubleshoot access to shared folders. Create and remove shared folders. Why This Chapter Matters Control access to shared folders

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

Module 12. Configuring and Managing Storage Technologies. Contents:

Module 12. Configuring and Managing Storage Technologies. Contents: Configuring and Managing Storage Technologies 12-1 Module 12 Configuring and Managing Storage Technologies Contents: Lesson 1: Overview of Windows Server 2008 Storage Management 12-3 Lesson 2: Managing

More information

BACKUP & RESTORE (FILE SYSTEM)

BACKUP & RESTORE (FILE SYSTEM) Table of Contents Table of Contents... 1 Perform a Backup (File System)... 1 What Gets Backed Up... 2 What Does Not Get Backed Up... 3 Perform a Restore... 4 Perform a Backup (File System) The following

More information

Creating and Managing Shared Folders

Creating and Managing Shared Folders Creating and Managing Shared Folders Microsoft threw all sorts of new services, features, and functions into Windows 2000 Server, but at the heart of it all was still the requirement to be a good file

More information

File and Printer Sharing with Microsoft Windows

File and Printer Sharing with Microsoft Windows Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

Manage Filespace with the ARS Console

Manage Filespace with the ARS Console Academic Services Exeter IT Desktop Support Manage Filespace with the ARS Console Document reference: Document type: Document status: Review period: DS021 Desktop Support Procedure Live Six months Next

More information

WINDOWS 7 & HOMEGROUP

WINDOWS 7 & HOMEGROUP WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows

More information

CIFS Permissions Best Practices Nasuni Corporation Natick, MA

CIFS Permissions Best Practices Nasuni Corporation Natick, MA Nasuni Corporation Natick, MA Overview You use permissions to control user access to data. There are two basic considerations when using permissions to control user access to data: Which users have access

More information

Using Microsoft Windows Encrypted File System (EFS)

Using Microsoft Windows Encrypted File System (EFS) Using Microsoft Windows Encrypted File System (EFS) Agenda Protecting our Data Types of Data What is EFS How to use EFS Best Practices Protecting our Data Two types of disk encryption: Full Disk Encryption

More information

Create, Link, or Edit a GPO with Active Directory Users and Computers

Create, Link, or Edit a GPO with Active Directory Users and Computers How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the

More information

Networking Lab - Vista Public Network Sharing

Networking Lab - Vista Public Network Sharing Networking Lab - Vista Public Network Sharing After completing the lab activity, you will be able to: Explain the differences between Windows XP and Windows Vista network sharing. Explain the purpose of

More information

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well. QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

Appendix B Lab Setup Guide

Appendix B Lab Setup Guide JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course

More information

Online Backup Linux Client User Manual

Online Backup Linux Client User Manual Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

PGP Desktop Email Quick Start Guide version 9.6

PGP Desktop Email Quick Start Guide version 9.6 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages

More information

Online Backup Client User Manual

Online Backup Client User Manual For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and

More information

Windows Clients and GoPrint Print Queues

Windows Clients and GoPrint Print Queues Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

Online Backup Client User Manual

Online Backup Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 2. DeviceLock Service Deployment...6

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1

Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1 Migrating Your Windows File Server to a CTERA Cloud Gateway Cloud Attached Storage February 2015 Version 4.1 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document may be

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20 Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup

More information

Jetico Central Manager. Administrator Guide

Jetico Central Manager. Administrator Guide Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

Netwrix Auditor for File Servers

Netwrix Auditor for File Servers Netwrix Auditor for File Servers Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

EMC Celerra Network Server

EMC Celerra Network Server EMC Celerra Network Server Release 5.6.47 Using Windows Administrative Tools with Celerra P/N 300-004-139 REV A02 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com

More information

Backup and Restore with 3 rd Party Applications

Backup and Restore with 3 rd Party Applications Backup and Restore with 3 rd Party Applications Contents Introduction...1 Backup Software Capabilities...1 Backing up a Single Autodesk Vault Site...1 Backup Process...1 Restore Process...1 Backing up

More information

Creating Home Directories for Windows and Macintosh Computers

Creating Home Directories for Windows and Macintosh Computers ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory

More information

Managing Applications, Services, Folders, and Libraries

Managing Applications, Services, Folders, and Libraries Lesson 4 Managing Applications, Services, Folders, and Libraries Learning Objectives Students will learn to: Understand Local versus Network Applications Remove or Uninstall an Application Understand Group

More information

Symantec Backup Exec Desktop Laptop Option ( DLO )

Symantec Backup Exec Desktop Laptop Option ( DLO ) The following is a short description of our backup software: BACKUP-EXEC-DLO. We have set many of the parameters for you but, if necessary, these parameters can be changed. Symantec Backup Exec Desktop

More information

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE Acronis Backup & Recovery for Mac Acronis Backup & Recovery & Acronis ExtremeZ-IP This document describes the technical requirements and best practices for implementation of a disaster recovery solution

More information

Office of Information Technologies (OIT)

Office of Information Technologies (OIT) Office of Information Technologies (OIT) Encrypting File System (EFS) November 14th, 2007 Contents Introduction... 1 Benefits... 1 How it works... 1 Enabling EFS... 2 Step 1: Obtain an EFS key pair...

More information

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,

More information

Online Backup Client User Manual

Online Backup Client User Manual Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have

More information

Security. The user and group account information for LookoutDirect 4 is kept in the Lookout.sec file, installed in your Windows SYSTEM directory.

Security. The user and group account information for LookoutDirect 4 is kept in the Lookout.sec file, installed in your Windows SYSTEM directory. 6 This chapter describes the two types of LookoutDirect operational security: network security and control security. Viewing security is primarily based in control security. You can use either or both

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Microsoft Network Operating Systems

Microsoft Network Operating Systems 7 Microsoft Network Operating Systems After studying this chapter, you will be able to: Identify the major differences between a Microsoft peer-to-peer network and a Microsoft client/server network. Discuss

More information

Lab 5 Managing Access to Shared Folders

Lab 5 Managing Access to Shared Folders Islamic University of Gaza Computer Network Lab Faculty of engineering ECOM 4121 Computer Department. Prepared by : Eng. Eman R. Al-Kurdi Managing Access to Shared Folders Objective: Manage access to shared

More information

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide 1 of 7 DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide Process Overview Step Description

More information

ExhIBIT 1 User Manager and Users Group

ExhIBIT 1 User Manager and Users Group 51-30-26 DATA COMMUNICATIONS MANAGEMENT SECURITY IN A WINDOWS NT ENVIRONMENT Gilbert Held INSIDE The User Manager, Creating a User Account, Comparing NT and NetWare Groups, Assigning Users to Groups, Working

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

4cast Server Specification and Installation

4cast Server Specification and Installation 4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system

More information

Cloud Storage Service

Cloud Storage Service Cloud Storage Service User Guide (Web Interface, Android App) Table of Content System Requirements...4 1.1Web Browser... 4 1.2Mobile Apps... 4 Accessing Cloud Storage using a Web Browser... 4 The Web Home

More information

Remote Storage Area (RSA) Basics

Remote Storage Area (RSA) Basics Remote Storage Area (RSA) Basics Table of Contents Remote Storage Area Overview... 3 What is Remote Storage Area?... 3 Who has access to RSA?... 3 How much space is available?... 3 Basic RSA Use... 4 How

More information

Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012

Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012 Sophos Disk Encryption License migration guide Product version: 5.61 Document date: June 2012 Contents 1 About this guide...3 2 Add encryption to an existing Sophos security solution...5 3 SDE/SGE 4.x

More information

Many home and small office networks exist for no

Many home and small office networks exist for no C H A P T E R Accessing and Sharing Network Resources Many home and small office networks exist for no other reason than to share a broadband Internet connection. The administrators of those networks attach

More information

Server & Workstation Installation of Client Profiles for Windows

Server & Workstation Installation of Client Profiles for Windows C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing

More information

MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.

MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6. STUDENT ACTIVITY 6.1: UNDERSTAND BACKUP AND RECOVERY METHODS MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.1 Lesson

More information

Yale Software Library. PGP 9.6 for Windows

Yale Software Library. PGP 9.6 for Windows PGP 9.6 for Windows How to Add keys to the All Keys key ring: 1. Run the PGP application from Start->All Programs->PGP. 2. In the PGP main application window, click on Search for keys. 3. In the Search

More information

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft

More information

About This Guide... 4. Signature Manager Outlook Edition Overview... 5

About This Guide... 4. Signature Manager Outlook Edition Overview... 5 Contents About This Guide... 4 Signature Manager Outlook Edition Overview... 5 How does it work?... 5 But That's Not All...... 6 And There's More...... 6 Licensing... 7 Licensing Information... 7 System

More information

Getting Started with. Ascent Capture Internet Server 5. 10300260-000 Revision A

Getting Started with. Ascent Capture Internet Server 5. 10300260-000 Revision A Ascent Capture Internet Server 5 Getting Started with Ascent Capture Internet Server 5 10300260-000 Revision A Copyright Copyright 2001 Kofax Image Products. All Rights Reserved. Printed in USA. The information

More information

AccuGuard Desktop and AccuGuard Server User Guide

AccuGuard Desktop and AccuGuard Server User Guide AccuGuard Desktop and AccuGuard Server User Guide 1 2 Table of Contents Welcome 4 Backup Simplified 5 Features 6 Protection Plans 7 Archived Data Viewing 8 Archived Data Restoring 9 Best Practices 11 Getting

More information

Network Setup Instructions

Network Setup Instructions Network Setup Instructions This document provides technical details for setting up the Elite Salon & Spa Management program in a network environment. If you have any questions, please contact our Technical

More information

Installing Windows XP Professional

Installing Windows XP Professional CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows

More information

Exam: 070-215 QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4

Exam: 070-215 QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4 Exam: 070-215 QUESTION 1 You want to provide complete redundancy for all data stored on your hardware RAID-5 disk array. You install a second hardware RAID-5 disk array. You want to create a mirror of

More information

Role Based Administration for LDMS 9.0 SP2

Role Based Administration for LDMS 9.0 SP2 Role Based Administration for LDMS 9.0 SP2 This article is designed to help you understand Role Based Administration for LDMS 9.0 SP2 and how to configure it. We will try to give you as much information

More information

Getting Started With Delegated Administration

Getting Started With Delegated Administration Getting Started With Delegated Administration Delegated Administration (available with Websense v6.1 Corporate Editions) is a powerful tool for distributing filtering and reporting responsibilities for

More information

Acronis Backup & Recovery 11.5 Quick Start Guide

Acronis Backup & Recovery 11.5 Quick Start Guide Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server

More information

Scala InfoChannel Content Manager 5 Backup and Restore Instructions

Scala InfoChannel Content Manager 5 Backup and Restore Instructions 4 Scala InfoChannel Content Manager 5 Backup and Restore Instructions This document describes how to backup and restore Scala InfoChannel Content Manager 5. Databases currently supported are: PostgreSQL

More information

Installation Manual (MSI Version)

Installation Manual (MSI Version) Installation Manual (MSI Version) 1. SYSTEM REQUIREMENTS... 2 2. INSTALLATION INSTRUCTIONS... 2 2.1 REMOTE INSTALLATION USING GROUP POLICY... 2 2.1.1 Assigning Software...2 2.1.2 Publishing Software...2

More information

Installing Active Directory

Installing Active Directory Installing Active Directory 119 Installing Active Directory Installing Active Directory is an easy and straightforward process as long as you planned adequately and made the necessary decisions beforehand.

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR

CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR TECHNICAL ARTICLE Product Version: 5.0 July 2013. Legal Notice The information in this publication is furnished for information use

More information

Xcalibur. Foundation. Administrator Guide. Software Version 3.0

Xcalibur. Foundation. Administrator Guide. Software Version 3.0 Xcalibur Foundation Administrator Guide Software Version 3.0 XCALI-97520 Revision A May 2013 2013 Thermo Fisher Scientific Inc. All rights reserved. LCquan, Watson LIMS, and Web Access are trademarks,

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

FTP Service Reference

FTP Service Reference IceWarp Unified Communications Reference Version 11.3 Published on 1/6/2015 Contents... 3 About... 4 Reference... 5 General Tab... 5 Dialog... 6 FTP Site... 6 Users... 7 Groups... 11 Options... 14 Access...

More information

HOUR 3. Installing Windows Server 2003

HOUR 3. Installing Windows Server 2003 HOUR 3 Installing Windows Server 2003 In this hour, we discuss the different types of Windows Server 2003 installations, such as upgrading an existing server or making a clean install on a server that

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Enterprise Apple Xserve Wiki and Blog using Active Directory. Table Of Contents. Prerequisites 1. Introduction 1

Enterprise Apple Xserve Wiki and Blog using Active Directory. Table Of Contents. Prerequisites 1. Introduction 1 Table Of Contents Prerequisites 1 Introduction 1 Making the Xserve an Open Directory Master 2 Binding the Xserve to Active Directory 3 Creating a Certificate 3 Setting up Apache Web Server 4 Applying the

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

TrueEdit Remote Connection Brief

TrueEdit Remote Connection Brief MicroPress Server Configuration Guide for Remote Applications Date Issued: February 3, 2009 Document Number: 45082597 TrueEdit Remote Connection Brief Background TrueEdit Remote (TER) is actually the same

More information

Server Installation: ServerTools

Server Installation: ServerTools Server Installation: ServerTools ServerTools Page 1 Table of Contents To Install ServerTools...3 Backup and Restore...6 Purpose...6 Background...6 Requirements...6 Creating a Backup Schedule using the

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

Installation Instructions Release Version 15.0 January 30 th, 2011

Installation Instructions Release Version 15.0 January 30 th, 2011 Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof

More information

Active Directory integration with CloudByte ElastiStor

Active Directory integration with CloudByte ElastiStor Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level

More information

Comodo Cloud Drive Software Version 1.0

Comodo Cloud Drive Software Version 1.0 2 Comodo Cloud Drive Software Version 1.0 User Guide Guide Version 1.0 080613 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Cloud Drive...

More information

Synchronizer Installation

Synchronizer Installation Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient

More information